Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity (English)
- New search for: Salako, K.
- New search for: Salako, K.
- New search for: Saglietti, F.
- New search for: Oster, Norbert
In:
Computer safety, reliability, and security
4680
;
411-416
;
2007
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity
-
Contributors:
-
Conference:International conference; 26th, Computer safety, reliability, and security ; 2007 ; Nuremberg, Germany
-
Published in:Computer safety, reliability, and security , 4680 ; 411-416LECTURE NOTES IN COMPUTER SCIENCE , 4680 ; 411-416
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2007-01-01
-
Size:6 pages
-
Remarks:International conference proceedings. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Establishing Evidence for Safety Cases in Automotive Systems - A Case StudyRidderhof, W. / Gross, H.-G. / Doerr, H. et al. | 2007
- 14
-
Goal-Based Safety Cases for Medical Devices: Opportunities and ChallengesSujan, M.-A. / Koornneef, F. / Voges, U. et al. | 2007
- 28
-
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane SafetyRobinson, R. / Li, M. / Lintelman, S. / Sampigethaya, K. / Poovendran, R. / von Oheimb, D. / Busser, J.-U. / Cuellar, J. et al. | 2007
- 40
-
Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk AssessmentLang, A. / Dittmann, J. / Kiltz, S. / Hoppe, T. et al. | 2007
- 54
-
Modelling Interdependencies Between the Electricity and Information InfrastructuresLaprie, J.-C. / Kanoun, K. / Kaaniche, M. et al. | 2007
- 68
-
Handling Malicious Code on Control SystemsTseng, W.-H. / Fan, C.-F. et al. | 2007
- 75
-
Management of Groups and Group Keys in Multi-level Security EnvironmentsAlhammouri, M. / Muftic, S. et al. | 2007
- 81
-
Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security SystemsNalepa, G. J. et al. | 2007
- 87
-
RAMSS Analysis for a Co-operative Integrated Traffic Management SystemSelhofer, A. / Gruber, T. / Putz, M. / Schoitsch, E. / Sonneck, G. et al. | 2007
- 93
-
Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian NetworksHosseini, S. M. H. / Takahashi, M. et al. | 2007
- 100
-
Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake SystemHeilmann, R. / Rothbauer, S. / Sutor, A. et al. | 2007
- 106
-
Compositional Temporal Fault Tree AnalysisWalker, M. / Bottaci, L. / Papadopoulos, Y. et al. | 2007
- 120
-
Representing Parameterised Fault Trees Using Bayesian NetworksMarsh, W. / Bearfield, G. et al. | 2007
- 134
-
Human Error Analysis Based on a Semantically Defined Cognitive Pilot ModelLudtke, A. / Pfeifer, L. et al. | 2007
- 148
-
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection SystemPark, G.-Y. / Lee, J.-S. / Cheon, S.-W. / Kwon, K.-C. / Jee, E. / Koh, K. Y. et al. | 2007
- 162
-
Specification of a Software Common Cause Analysis MethodFaller, R. et al. | 2007
- 172
-
Combining Bayesian Belief Networks and the Goal Structuring Notation to Support Architectural Reasoning About SafetyWu, W. / Kelly, T. et al. | 2007
- 187
-
Application of Interactive Cause and Effect Diagrams to Safety-Related PES in Industrial AutomationRusso, H. / Turk, A. et al. | 2007
- 197
-
Survival by DeceptionJaatun, M. G. / Nyre, A. A. / Sorensen, J. T. et al. | 2007
- 209
-
How to Secure Bluetooth-Based Pico NetworksNilsson, D. K. / Porras, P. A. / Jonsson, E. et al. | 2007
- 224
-
Learning from Your Elders: A Shortcut to Information Security Management SuccessSveen, F. O. / Torres, J. M. / Sarriegi, J. M. et al. | 2007
- 238
-
Intrusion Attack Tactics for the Model Checking of e-Commerce Security GuaranteesBasagiannis, S. / Katsaros, P. / Pombortsis, A. et al. | 2007
- 252
-
Safety Process Improvement with POSE and AlloyMannering, D. / Hall, J. G. / Rapanotti, L. et al. | 2007
- 258
-
Defense-in-Depth and Diverse Qualification of Safety-Critical SoftwareMiedl, H. / Lee, J.-S. / Lindner, A. / Hoffman, E. / Martz, J. / Lee, Y.-J. / Choi, J.-G. / Kim, J.-Y. / Cha, K.-H. / Cheon, S.-W. et al. | 2007
- 264
-
Experimental Evaluation of the DECOS Fault-Tolerant Communication LayerVinter, J. / Eriksson, H. / Ademaj, A. / Leiner, B. / Schlager, M. et al. | 2007
- 270
-
Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different ApproachesSalewski, F. / Kowalewski, S. et al. | 2007
- 276
-
Modeling, Analysis and Testing of Safety Issues - An Event-Based Approach and Case StudyBelli, F. / Hollmann, A. / Nissanke, N. et al. | 2007
- 283
-
A Concept for a Safe Realization of a State Machine in Embedded Automotive ApplicationsMottok, J. / Schiller, F. / Volkl, T. / Zeitler, T. et al. | 2007
- 289
-
Safety Demonstration and Software DevelopmentLaprie, J.-C. et al. | 2007
- 301
-
Improving Test Coverage for UML State Machines Using Transition InstrumentationFriske, M. / Schlingloff, B.-H. et al. | 2007
- 315
-
Verification of Distributed ApplicationsLangenstein, B. / Nonnengart, A. / Rock, G. / Stephan, W. et al. | 2007
- 329
-
Analysis of Combinations of CRC in Industrial CommunicationMattes, T. / Pfahler, J. / Schiller, F. / Honold, T. et al. | 2007
- 342
-
A Comparison of Partitioning Operating Systems for Integrated SystemsLeiner, B. / Schlager, M. / Obermaisser, R. / Huber, B. et al. | 2007
- 356
-
Software Encoded Processing: Building Dependable Systems with Commodity HardwareWappler, U. / Fetzer, C. et al. | 2007
- 370
-
Reliability Modeling for the Advanced Electric Power GridFaza, A. Z. / Sedigh, S. / McMillin, B. M. et al. | 2007
- 384
-
Case Study on Bayesian Reliability Estimation of Software Design of Motor Protection RelayHelminen, A. et al. | 2007
- 397
-
A Reliability Evaluation of a Group Membership ProtocolRosset, V. / Souto, P. F. / Portugal, P. / Vasques, F. et al. | 2007
- 411
-
Bounds on the Reliability of Fault-Tolerant Software Built by Forcing DiversitySalako, K. et al. | 2007
- 417
-
A Tool for Network Reliability AnalysisBobbio, A. / Terruggia, R. / Boellis, A. / Ciancamerla, E. / Minichino, M. et al. | 2007
- 423
-
DFT and DRBD in Computing Systems Dependability AnalysisDistefano, S. / Puliafito, A. et al. | 2007
- 430
-
Development of Model Based Tools to Support the Design of Railway Control ApplicationsMajzik, I. / Micskei, Z. / Pinter, G. et al. | 2007
- 436
-
Formal Specification and Analysis of AFDX Redundancy Management AlgorithmsTaubrich, J. / von Hanxleden, R. et al. | 2007
- 451
-
Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended SafechartsChen, Y.-R. / Hsiung, P.-A. / Chen, S.-J. et al. | 2007
- 465
-
Using Deductive Cause-Consequence Analysis (DCCA) with SCADEGudemann, M. / Ortmeier, F. / Reif, W. et al. | 2007
- 479
-
Experimental Assessment of Astree on Safety-Critical Avionics SoftwareSouyris, J. / Delmas, D. et al. | 2007
- 491
-
Detection of Runtime Errors in MISRA C Programs: A Deductive ApproachJohn, A. K. / Sharma, B. / Bhattacharjee, A. K. / Dhodapkar, S. D. / Ramesh, S. et al. | 2007
- 505
-
A Taxonomy for Modelling Safety Related Architectures in Compliance with Functional Safety RequirementsBerthing, J. / Maier, T. et al. | 2007
- 518
-
Controller Architecture for Safe Cognitive Technical SystemsKain, S. / Ding, H. / Schiller, F. / Stursberg, O. et al. | 2007
- 532
-
Improved Availability and Reliability Using Re-configuration Algorithm for Task or Process in a Flight Critical SoftwareMuniyappa, A. C. et al. | 2007